Web Penetration Testing with Kali Linux - Second Edition

Web Penetration Testing with Kali Linux - Second Edition

Build your safeguard opposed to internet assaults with Kali Linux 2.0

About This Book

  • Gain a deep knowing of the issues in net functions and take advantage of them in a realistic manner
  • Get hands-on net software hacking adventure with a number instruments in Kali Linux 2.0
  • Develop the sensible abilities required to grasp a number of instruments within the Kali Linux 2.0 toolkit

Who This booklet Is For

If you're already operating as a community penetration tester and need to extend your wisdom of net program hacking, then this booklet adapted for you. people who are drawn to studying extra in regards to the Kali Sana instruments which are used to check net purposes will locate this e-book a completely beneficial and engaging guide.

What you are going to Learn

  • Set up your lab with Kali Linux 2.0
  • Identify the adaptation among hacking an internet program and community hacking
  • Understand the various options used to spot the flavour of internet applications
  • Expose vulnerabilities found in internet servers and their functions utilizing server-side attacks
  • Use SQL and cross-site scripting (XSS) attacks
  • Check for XSS flaws utilizing the burp suite proxy
  • Find out concerning the mitigation strategies used to negate the consequences of the Injection and Blind SQL attacks

In Detail

Kali Linux 2.0 is the hot iteration of the industry-leading backpedal Linux penetration trying out and safeguard auditing Linux distribution. It includes numerous hundred instruments aimed toward quite a few details safety projects similar to penetration checking out, forensics, and opposite engineering.

At the start of the e-book, you may be brought to the suggestions of hacking and penetration checking out and should get to understand in regards to the instruments utilized in Kali Linux 2.0 that relate to net program hacking. Then, you'll achieve a deep realizing of SQL and command injection flaws and how you can make the most the failings. relocating on, you'll get to grasp extra approximately scripting and enter validation flaws, AJAX, and the safety concerns concerning AJAX.

At the tip of the publication, you'll use an automatic approach referred to as fuzzing as a way to establish flaws in an online software. eventually, you'll comprehend the internet program vulnerabilities and the ways that they are often exploited utilizing the instruments in Kali Linux 2.0.

Style and approach

This step by step consultant covers every one subject with exact functional examples. each suggestion is defined with assistance from illustrations utilizing the instruments to be had in Kali Linux 2.0.

Show sample text content

Download sample